Invited Talk -- Pattern Matching over a Dynamic Network of Tuple Spaces -- Models and Calculi -- A Dynamic Class Construct for Asynchronous Concurrent Objects -- An Abstract Machine for the Kell Calculus -- XPi: A Typed Process Calculus for XML Messaging -- UML -- Checking the Validity of Scenarios in UML Models -- An Extended Type System for OCL Supporting Templates and Transformations -- A Se…
Invited Talks -- Security by, and for, Converged Mobile Devices -- Security for Ubiquitous Computing -- Block Cipher and Stream Cipher -- Algebraic Attacks on Combiners with Memory and Several Outputs -- New Method for Bounding the Maximum Differential Probability for SPNs and ARIA -- Dragon: A Fast Word Based Stream Cipher -- Public Key Cryptosystem -- An Efficient and Verifiable Solution to t…
Hard Real-Time Development Environments -- Executive Overview on Hard Real-Time Development Environments -- Hard Real-Time System Development -- Current Design Practice and Needs in Selected Industrial Sectors -- Tools for Requirements Capture and Exploration -- Tools for Architecture Design and Capture -- Tools for Programming, Code Generation, and Design -- Tools for Verification and Validati…
Adaptation, Power Consumption and Scheduling -- Energy Management for Embedded Multithreaded Processors with Integrated EDF Scheduling -- Reducing System Level Power Consumption for Mobile and Embedded Platforms -- Implementing Control Algorithms Within a Multithreaded Java Microcontroller -- Adaptivity for Quality and Timeliness Flexible Real-Time Systems -- Adaptation and Agents -- Apricot Ag…
Hardness Amplification and Error Correction -- Optimal Error Correction Against Computationally Bounded Noise -- Hardness Amplification of Weakly Verifiable Puzzles -- On Hardness Amplification of One-Way Functions -- Graphs and Groups -- Cryptography in Subgroups of -- Efficiently Constructible Huge Graphs That Preserve First Order Properties of Random Graphs -- Simulation and Secure Computat…
Fair Exchange -- An Evenhanded Certified Email System for Contract Signing -- Efficient ID-Based Optimistic Fair Exchange with Provable Security -- On the Quest for Impartiality: Design and Analysis of a Fair Non-repudiation Protocol -- Generic, Optimistic, and Efficient Schemes for Fair Certified Email Delivery -- Digital Signatures I -- Cryptanalysis of a Forward Secure Blind Signature Scheme…
Invited Talk -- All Sail, No Anchor III: Risk Aggregation and Time’s Arrow -- Network Security -- Traversing Middleboxes with the Host Identity Protocol -- An Investigation of Unauthorised Use of Wireless Networks in Adelaide, South Australia -- An Efficient Solution to the ARP Cache Poisoning Problem -- Cryptanalysis -- On Stern’s Attack Against Secret Truncated Linear Congruential Generat…
Preface -- Solving Over-Constrained Problems with SAT Technology -- A Symbolic Search Based Approach for Quantified Boolean Formulas -- Substitutional Definition of Satisfiability in Classical Propositional Logic -- A Clause-Based Heuristic for SAT Solvers -- Effective Preprocessing in SAT Through Variable and Clause Elimination -- Resolution and Pebbling Games -- Local and Global Complete Solu…
Symbolic Equivalences for Open Systems -- Specifying and Verifying UML Activity Diagrams Via Graph Transformation -- Mobile UML Statecharts with Localities -- Communities: Concept-Based Querying for Mobile Services -- Towards a Formal Treatment of Secrecy Against Computational Adversaries -- For-LySa: UML for Authentication Analysis -- Performance Analysis of a UML Micro-business Case Study -- …
Obfuscated Code Detection -- Analyzing Memory Accesses in Obfuscated x86 Executables -- Hybrid Engine for Polymorphic Shellcode Detection -- Honeypots -- Experiences Using Minos as a Tool for Capturing and Analyzing Novel Worms for Unknown Vulnerabilities -- A Pointillist Approach for Comparing Honeypots -- Vulnerability Assessment and Exploit Analysis -- Automatic Detection of Attacks on Crypt…